Data verification

Results: 958



#Item
61

IMPROVED SVM SPEAKER VERIFICATION THROUGH DATA-DRIVEN BACKGROUND DATASET SELECTION Mitchell McLaren, Brendan Baker, Robbie Vogt, Sridha Sridharan Speech and Audio Research Laboratory, Queensland University of Technology,

Add to Reading List

Source URL: mistral.univ-avignon.fr

Language: English
    62

    DATA-DRIVEN VERIFICATION A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2016-01-28 00:57:22
      63

      1496 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 18, NO. 6, AUGUST 2010 Data-Driven Background Dataset Selection for SVM-Based Speaker Verification

      Add to Reading List

      Source URL: mistral.univ-avignon.fr

      Language: English - Date: 2015-03-13 08:43:38
        64

        Vercors – Verification of Concurrent Data Structures Hedendaagse softwaretoepassingen stellen steeds hogere eisen aan de snelheid van de onderliggende hardware. Hardware is de laatste decennia wel veel sneller geworden

        Add to Reading List

        Source URL: fmt.cs.utwente.nl

        Language: Dutch - Date: 2011-03-06 19:20:30
          65

          Modular Data Structure Verification

          Add to Reading List

          Source URL: lara.epfl.ch

          Language: English - Date: 2007-09-24 10:35:57
            66

            THE USE OF BANK DATA FOR IDENTITY VERIFICATION White Paper   August 2015

            Add to Reading List

            Source URL: www.oixuk.org

            Language: English - Date: 2015-08-19 08:53:06
              67Software engineering / Programming language theory / Theoretical computer science / C++ / Logic in computer science / Proof assistants / Data types / SHA-2 / Formal verification / Separation logic / Coq / Functional programming

              Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f

              Add to Reading List

              Source URL: www.cs.princeton.edu

              Language: English - Date: 2014-12-23 10:16:22
              68

              A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage∗ Sooyeon Shin and Taekyoung Kwon† Graduate School of Information, Yonsei University, Seoul, Republic of Korea shinsy80@gmai

              Add to Reading List

              Source URL: isyou.info

              Language: English - Date: 2015-08-26 21:22:36
                69

                Verification as Specialization of Interpreters with Respect to Data Alexei P. Lisitsa1 and Andrei P. Nemytykh2? 1 Department of Computer Science, The University of Liverpool

                Add to Reading List

                Source URL: meta2008.pereslavl.ru

                Language: English - Date: 2010-12-31 06:04:07
                  70

                  Attack, solution and verification for shared authorisation data in TCG TPM Liqun Chen and Mark Ryan HP Labs, UK, and University of Birmingham, UK

                  Add to Reading List

                  Source URL: www.cs.bham.ac.uk

                  Language: English - Date: 2009-09-11 10:36:45
                    UPDATE